As an example, wireless ports, such as Wi-Fi and Bluetooth,
are vulnerable to an adversary in a war driving or blue snarfing/blue jacking scenario. In this event, the unauthorized user has the potential to access the device and compromise the stored data.